Will Obfuscation Work?
Will Obfuscation Work?
This chapter takes up the question of how obfuscation strategies should be designed, measured, assessed, and improved. To answer, it describes different approaches to obfuscation in terms of threats and adversaries: what is the nature of the challenge a particular application of obfuscation should meet? In these terms, every obfuscation strategy can be described with six goals (from “buying time” to “expressing protest”) and four questions (from “individual or collective?” to “short-term or long-term?”). These goals and questions are the framework for the design of specific obfuscation efforts.
Keywords: Obfuscation, Threat modelling, Privacy, Security, Activism, Design
MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.
Please, subscribe or login to access full text content.
If you think you should have access to this title, please contact your librarian.
To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.